Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
Library Search
Library Favorites Search
Advance Management
-- Audio Visuals
-- Book
-- Compact Disc
Fiction
-- Journals
-- Maps & Charts
-- Newspaper Article
Thesis
Rooms Restriction Values
All Fields
Author
Title
Series
Subject
Call Number
ISBN
ISSN
8
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Narrowed by:
+
Subject: Computer security
Author
Include
Exclude
Fakulti Sains Komputer dan Sistem Maklumat
(131)
Sekolah Informatiks Termaju
(68)
Fakulti Komputeran
(27)
Norafida Ithnin
(21)
Faculty of Advanced Informatics School
(20)
Subariah Ibrahim
(17)
Azizah Abd. Manaf, Prof.Dr., supervisor
(14)
Abdul Hanan Abdullah
(11)
Mazleena Salleh
(11)
Azizah Abdul Manaf
(10)
Fakulti Kejuruteraan Elektrik
(10)
Mohd. Aizaini Maarof
(10)
McClure, Stuart
(9)
Rabiah Ahmad, supervisor
(9)
Scambray, Joel
(9)
Stallings, William
(9)
Md. Asri Ngadi, supervisor
(7)
Norbik Bashah Idris
(7)
Zuraini Ismail, supervisor
(7)
Bharanidharan Shanmugam, Dr.
(6)
Chirillo, John, 1970-
(6)
Ghazali Sulong
(6)
Mattord, Herbert J.
(6)
Nelson, Bill
(6)
Zuraini Ismail, Assoc.Prof.Dr., supervisor
(6)
Azri Azmi, supervisor
(5)
Barrett, Diane
(5)
Bharanidharan Shanmugam, Dr., supervisor
(5)
Kurtz, George
(5)
Merkow, Mark S.
(5)
Mohd. Aizaini Maarof, supervisor
(5)
Pathmenanthan Ramakrishna
(5)
Whitman, Michael E.
(5)
Afzan Zaidi
(4)
Ciampa, Mark
(4)
Dahliyusmanto Dahlan
(4)
Imran Ghani, supervisor
(4)
Jajodia, Sushil
(4)
Krutz, Ronald L., 1938-
(4)
Mohd. Shahidan Abdullah, Dr., supervisor
(4)
Northcutt, Stephen
(4)
Nurazean Maarop, Dr., supervisor
(4)
Pan, Jeng-Shyang
(4)
Peltier, Thomas R.
(4)
Rasimah Che Mohd. Yusoff, Dr., supervisor
(4)
Saiful Adli Ismail, Dr., supervisor
(4)
Sekolah Informatik Termaju
(4)
Shukor Abd. Razak, supervisor
(4)
Solomon, Michael, (Michael G.), 1963-
(4)
Universiti Teknologi Malaysia. Fakulti Sains Komputer dan Sistem Maklumat
(4)
Zailani Mohamed Sidek, supervisor
(4)
Akram Mohd. Zeki
(3)
Ali Yusny Daud
(3)
Azizah Abd. Manaf
(3)
Azizah Abd. Manaf, Prof. Dr.
(3)
Azizah Abd. Manaf, supervisor
(3)
Bharanidharan Shanmugam, supervisor
(3)
Bong, Thai Kwong
(3)
Casey, Eoghan
(3)
Cole, Eric
(3)
Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)
(3)
Eckert, Jason W.
(3)
Fakulti Kejuruteraan. Sekolah Komputeran
(3)
Gollmann, Dieter
(3)
Harihodin Selamat
(3)
Hassan Chizari, 1975-, contributor
(3)
Hau, Yuan Wen, 1980-
(3)
International Symposium on Information Technology (2003 : Kuala Lumpur)
(3)
Kamalrulnizam Abu Bakar
(3)
Lim, Kie Woon
(3)
Majid Bakhtiari, Dr.
(3)
Malaysian Science and Technology Congress (2002 : Johor Bahru)
(3)
Maslin Masrom, supervisor
(3)
Mattord, Herbert J., author
(3)
McGraw, Gary, 1966-
(3)
Md. Asri Ngadi
(3)
Moeller, Robert R.
(3)
Mohd. Shahidan Abdullah, Assoc.Prof.Dr., supervisor
(3)
Mohd. Shahidan Abdullah, Dr.
(3)
Novell, Inc.
(3)
Nurazean Maarop, supervisor
(3)
Nurulhuda Firdaus Mohd. Azmi, Dr., supervisor
(3)
Sayuthi Jaafar
(3)
Schneier, Bruce, 1963-
(3)
Shah, Shreeraj
(3)
Siti Hajar Othman
(3)
SpringerLink (Online service)
(3)
Stallings, William
(3)
Stamp, Mark
(3)
Vacca, John R.
(3)
Viega, John
(3)
Volonino, Linda
(3)
Zailani Mohamed Sidek, Assoc.Prof.Dr.
(3)
Zuraini Ismail
(3)
Ab. Razak Che Hussin
(2)
Abd. Rahim Mat Sidek
(2)
Abdalrahman Salem Alfagi, 1977-, author
(2)
Abdilahi Deria Liban, 1982-
(2)
Abdul Ghafar Jaafar, 1985-, author
(2)
Abdul Monem S. Rahma, Dr., supervisor
(2)
Abrams, Marshall D.
(2)
Abubaker Essid Abuhtera, 1966-, author
(2)
Adly Abd. Rahman
(2)
Adnan Abdirahman Adami, 1984-
(2)
Afiqah Ahmad Said, 1986-
(2)
Ahmad Husnuddin Mohd. Zawai, 1979-, author
(2)
Ahmad Kamil Zailani
(2)
Ahmad Sahban Rafsanjani, author
(2)
Ahmad Syahrul Anuar Saidi, 1986-
(2)
Ahmad Zuri Sha'ameri
(2)
Ahmed A. A. Abunada, 1987-
(2)
Ahmed Sabeeh Yousif, 1986-
(2)
Ain'natul Mardhiah Mohamad Hasbullah, 1990-, author
(2)
Alhebshi, Ebrahim, 1988-, author
(2)
Ali Mohamed Eljetlawi, 1968-
(2)
Ali Nadawi Hamsani
(2)
Alla Talib Mohsin, 1986-
(2)
Allen, Julia H.
(2)
Alqahtani, Saeed Ibrahim S., 1984-
(2)
Amalina Farhan Kamaruddin, 1985-
(2)
Amalina Mohd. Ghazzali
(2)
Amir Haziq Loh Bojeng, 1986-
(2)
Amirmohammad Sadeghian, 1987- , author
(2)
Amirul Zakwan Safar, 1977-, author
(2)
Anas Mustafa Mohammed Al-Aghbari, 1981-
(2)
Anazida Zainal, Dr., supervisor
(2)
Anazida Zainal, supervisor
(2)
Andrea Jok
(2)
Andress, Jason
(2)
Anzaldua, Reynaldo
(2)
Aquilina, James M.
(2)
Armaghan Behnia, 1986-
(2)
Atefeh Mirzaee, 1986-
(2)
Axelrod, C. Warren
(2)
Aziah Asmawi, 1981-
(2)
Azizah Abdul Manaf, Dr., supervisor
(2)
Bacik, Sandy
(2)
Bakhdlaghi, Yousef
(2)
Balakrishnan Subramanian
(2)
Basam N. Saleh
(2)
Bassem Gamal Hanash Qasem, 1984-
(2)
Bejtlich, Richard
(2)
Bleumer, Gerrit
(2)
Bojnord, Hoda Soltanian
(2)
Boswell, Steven
(2)
Bott, Ed
(2)
Boulanger, Jean-Louis
(2)
Bray, Rory
(2)
Breithaupt, Jim
(2)
Broom, Neil
(2)
Broom, Nell
(2)
Bryant, Bringle R.
(2)
Calabrese, Thomas
(2)
Caloyannides, Michael A.
(2)
Calvert, Ben
(2)
Campbell, Paul
(2)
Chang, Yu Cheng
(2)
Chess, Brian
(2)
Chia, Won Chee
(2)
Choong, Kai Bin, 1993-, author
(2)
Chua, Bao Shu
(2)
Chua, Lee Ping, 1982-
(2)
Cid, Daniel
(2)
Cioara, Jeremy
(2)
Cisco Learning Institute
(2)
Clarke, Justin
(2)
Collette, Ronald D.
(2)
Conklin, Wm. Arthur
(2)
Conley, James W.
(2)
Cross, Michael
(2)
Devan Muthusamy
(2)
Doaa Saleh Abobakar Baras, 1987-
(2)
Eddie Shahril Ismail
(2)
Eng, Chia Jing, 1989-
(2)
Essa Zaki Abdulrazak, 1979-
(2)
Fadia, Ankit, 1985-
(2)
Fakulti Sains
(2)
Farhood Farid Etemad
(2)
Faridah Hanim Haron
(2)
Farnaz Towhidi
(2)
Fazli Mat Nor
(2)
Firoz Yusuf Patel Dawoodi
(2)
Fiza Abdul Rahim, 1983-
(2)
Fouziah Saleh Abdullah Aleidan, 1983-
(2)
Fuad Harriz Abd. Rahim, 1982-, author
(2)
Ganthan Narayana Samy, Dr., 1977-, supervisor
(2)
Ganthan Narayana Samy, Dr., supervisor
(2)
Geier, Eric, 1984-
(2)
Geier, James T.
(2)
Gregory, Peter
(2)
Gupta, Ajay
(2)
Hairul Anuar Mat Nor, 1976-
(2)
Hairul Azni Mohd. Isa, 1981-
(2)
Hairunnazri Haron, 1985-, author
(2)
Hardiyana Abd. Rahman, supervisor
(2)
Harris, Shon
(2)
Hassan Chizari, 1975-, editor
(2)
Hau, Lian Hong
(2)
Hay, Andrew
(2)
Hayes, Bert
(2)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(995)
Malay
(147)
Japanese
(1)
Format
Include
Exclude
Books
(1016)
Computer file
(96)
Visual Materials
(48)
Electronic Resources
(5)
Material Type
Include
Exclude
Book
Closed Access Book
Closed Access Computer File
Closed Access Thesis
Computer File Accompanies Open Access Book
Computer File Accompanies UTM Thesis/Project Paper
Electronic Book
Non Circulating Microfilm
Non Circulating UTM Archive - Audio Visual
Non Circulating UTM Special Collection Materials
Open Access Book
Open Access Computer File
Reference Book
Restricted and Confidential Materials
UTM Research Report
UTM Special Collection - Computer File
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Computer networks -- Security measures
(302)
Data protection
(167)
Cryptography
(112)
Data encryption (Computer science)
(84)
Computers -- Access control
(64)
Computer crimes -- Investigation
(29)
Information technology -- Security measures
(28)
Computer crimes
(23)
Internet -- Security measures
(23)
Operating systems (Computers)
(22)
Digital watermarking
(21)
Computer hackers
(19)
Forensic sciences
(19)
System design
(18)
Security systems
(16)
Computer viruses
(15)
Database security
(14)
Digital signatures
(13)
Electronic data processing departments -- Security measures
(13)
Microsoft Windows (Computer file)
(13)
Risk assessment
(13)
Computer software -- Development
(12)
Linux
(12)
Business enterprises -- Computer networks -- Security measures
(11)
Internet (Computer network) -- Security measures
(11)
Software protection
(10)
UNIX (Computer file)
(10)
Computer crimes -- Prevention
(9)
Cryptography -- Data processing
(9)
Firewalls (Computer security)
(9)
Intelligent agents (Computer software)
(9)
Management information systems
(9)
Public key infrastructure (Computer security)
(9)
Risk management
(9)
SQL (Computer program language)
(9)
Cloud computing -- Security measures
(8)
Computer architecture
(8)
Computers -- Access control -- Passwords
(8)
Data mining
(8)
Data recovery (Computer science)
(8)
Electronic commerce -- Security measures
(8)
Java (Computer program language)
(8)
Malware (Computer software)
(8)
Multimedia systems -- Security measures
(8)
Web sites -- Security measures
(8)
Application software -- Development
(7)
Authentication
(7)
Cloud computing
(7)
Coding theory
(7)
Computer algorithms
(7)
Computer interfaces
(7)
Computer software -- Reliability
(7)
Electronic commerce
(7)
Expert systems (Computer science)
(7)
Internet
(7)
Public key cryptography
(7)
Artificial intelligence
(6)
Computer software -- Testing
(6)
Data transmission systems
(6)
Database management
(6)
Embedded computer systems
(6)
Management information systems -- Security measures
(6)
Smart cards
(6)
Telecommunication systems -- Security measures
(6)
Business -- Data processing -- Security measures
(5)
Client/server computing
(5)
Computer networks
(5)
Computer networks -- Access control
(5)
Hackers
(5)
Intellectual property
(5)
Inventory control -- Data processing
(5)
Machine learning
(5)
Mobile agents (Computer software)
(5)
Mobile communication systems -- Security measures
(5)
Online social networks -- Security measures
(5)
Wireless communication systems -- Security measures
(5)
Artificial neural networks
(4)
Computer software -- Quality control
(4)
Cyberspace -- Security measures
(4)
Electronic information resources -- Access control
(4)
Identity theft -- Prevention
(4)
Information resources management
(4)
Information storage and retrieval systems -- Security measures
(4)
Information technology -- Management
(4)
Local area networks (Computer networks)
(4)
Open source software
(4)
Passports -- Security measures
(4)
Privacy, Right of
(4)
Software engineering
(4)
Steganography
(4)
Telecommunication -- Security measures
(4)
Web site development
(4)
Web sites -- Design
(4)
World wide web (Information retrieval system)
(4)
Bar coding
(3)
Biometric identification
(3)
C (Computer program language)
(3)
Computational intelligence
(3)
Computer crimes -- Accidents -- Investigation
(3)
Computer graphics
(3)
Computer simulation
(3)
Computer systems -- Reliability
(3)
Computer-assisted instruction
(3)
Computers -- Access control
(3)
Database design
(3)
Decision support systems
(3)
Electronic data processing -- Auditing
(3)
Electronic data processing -- Distributed processing
(3)
Electronic mail messages -- Security measures
(3)
Electronic mail systems
(3)
Forensic sciences -- Data processing
(3)
HTML (Document markup language)
(3)
Hacking
(3)
Information networks -- Security measures
(3)
Internet programming
(3)
Internet relay chat
(3)
Mobile computing
(3)
Mobile computing -- Security measures
(3)
Pattern recognition systems
(3)
Penetration testing (Computer security)
(3)
Phishing
(3)
Signal processing -- Digital techniques
(3)
Software configuration management
(3)
Telecommunication systems
(3)
Ubiquitous computing
(3)
Virtual computer systems
(3)
Virtual reality
(3)
Active server pages
(2)
Algorithms
(2)
Application software -- Security measures
(2)
Automatic speech recognition
(2)
Book chapter
(2)
Business -- Data processing
(2)
Business enterprises -- Security measures
(2)
C++ (Computer program language)
(2)
CAPTCHA (Challenge-response test)
(2)
Client/server computing -- Security measures
(2)
Component software
(2)
Computer -- Access control -- Testing
(2)
Computer crimes -- Investigation -- Methodology
(2)
Computer crimes -- Investigation -- United States -- Methodology
(2)
Computer engineering
(2)
Computer network -- Security measures
(2)
Computer network protocols
(2)
Computer networks -- Management
(2)
Computer networks -- Scalability -- Congresses
(2)
Computer networks -- Security measures -- Examinations -- Study guides
(2)
Computer networks -- Security measures.
(2)
Computer software
(2)
Computer sound processing
(2)
Computers and civilization
(2)
Copyright -- Computer programs
(2)
Counseling in secondary education
(2)
Crime and criminals
(2)
Curves, Elliptic
(2)
Debugging in computer science
(2)
Education -- Data processing
(2)
Electronic books
(2)
Electronic data processing
(2)
Electronic data processing -- Distributed processing -- Security measures
(2)
Electronic data processing departments -- Auditing
(2)
Electronic mail messages
(2)
Electronic security systems
(2)
Emergency management
(2)
Facebook (Electronic resource)
(2)
File organization (Computer science)
(2)
Filing systems
(2)
Forensic accounting
(2)
Forgery
(2)
Gaussian processes
(2)
HTTP (Computer network protocol)
(2)
Hewlett-Packard computers -- Security measures
(2)
Human-computer interaction
(2)
Hybrid integrated circuits
(2)
IBM personal computer XT -- Security measures
(2)
Image processing
(2)
Image processing -- Digital techniques
(2)
Imaging systems
(2)
Information storage and retrieval systems
(2)
Information systems
(2)
Information technology -- Moral and ethical aspects
(2)
Information warfare -- Malaysia
(2)
Internet (Computer network)
(2)
Internet -- Safety measures
(2)
Internet -- Social aspects
(2)
Internet advertising
(2)
Lotus Notes for Windows
(2)
Macintosh (Computer)
(2)
Malaysia -- Politics and government
(2)
Management -- Data processing
(2)
Management -- Geographic information systems
(2)
Microsoft .NET.
(2)
Multimedia communicatios -- Security measures
(2)
Multimedia systems
(2)
Note-taking
(2)
Object-oriented programming (Computer science)
(2)
Online data processing
(2)
Online social networks
(2)
Optical pattern recognition
(2)
Organization
(2)
More
View All
Fewer
Collapse All
true
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1165 Results Found
1
..
94
95
96
97
98
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
0
MAIN
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
1165.
A Beginner’s Guide to Internet of Things Security : Attacks, Applications, Authentication, and Fundamentals
by
Gupta, Brij, 1982-, author
Author
Gupta, Brij, 1982-, author, Tewari, Aakanksha, author
Format:
Call Number
QA76.9.A25 G87 2020
ISBN
9780367430696
Available:
Holds:
Copies:
Show MARC
SD_ILS:887395
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
..
94
95
96
97
98